A payment system that uses replacement account identifiers is disclosed. An encrypted primary account number (PAN) may be received by a secure computer from a data entry device. The encrypted PAN may be decrypted by the secure computer and the secure computer may transmit a zero, nominal or no dollar authorization request to an issuer. Using the zero, nominal or no dollar authorization request, the issuer may verify the account. If the account is verified, then a replacement account identifier can be issued at a later time. The replacement account identifier may be used instead of the actual PAN to conduct payment transactions.
|
1. A method comprising:
receiving, by a management computer, an authorization identifier, wherein the authorization identifier is generated by an authorization computer after the authorization computer receives a first authorization request message comprising an original account identifier and a zero, nominal or no dollar amount, wherein the authorization identifier is provided in a first authorization response message;
generating, by the management computer, a replacement account identifier request message;
transmitting, by the management computer, the replacement account identifier request message to a payment processing computer, the replacement account identifier request message includes the authorization identifier;
receiving, by the management computer, in response to transmitting the replacement account identifier request message including the authorization identifier, a replacement account identifier response message comprising a replacement account identifier;
generating, by the management computer, a second authorization request message comprising a transaction amount and the replacement account identifier to the payment processing computer to authorize a transaction; and
receiving, by the management computer, a second authorization response message authorizing or declining the transaction, the second authorization response message including the replacement account identifier.
8. A management computer comprising:
a processor; and
a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor to implement a method comprising
receiving an authorization identifier, wherein the authorization identifier is generated by an authorization computer after the authorization computer receives a first authorization request message comprising an original account identifier and a zero, nominal or no dollar amount, wherein the authorization identifier is provided in a first authorization response message;
generating a replacement account identifier request message;
transmitting the replacement account identifier request message to a payment processing computer, the replacement account identifier request message includes the authorization identifier;
receiving, in response to transmitting the replacement account identifier request message including the authorization identifier, a replacement account identifier response message comprising a replacement account identifier;
generating, by the management computer, a second authorization request message comprising a transaction amount and the replacement account identifier to the payment processing computer to authorize a transaction; and
receiving, by the management computer, a second authorization response message authorizing or declining the transaction, the second authorization response message including the replacement account identifier.
10. A system comprising:
a local workstation; and
a management computer in communication with the local workstation, the management computer comprising a processor, and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor to implement a method comprising
receiving an authorization identifier from the local workstation, wherein the authorization identifier is generated by an authorization computer after the authorization computer receives an authorization request message comprising an original account identifier and a zero, nominal or no dollar amount, wherein the authorization identifier is provided in a first authorization response message;
generating a replacement account identifier request message;
transmitting the replacement account identifier request message to a payment processing computer, the replacement account identifier request message includes the authorization identifier;
receiving in response to transmitting the replacement account identifier request message including the authorization identifier, a replacement account identifier response message comprising a replacement account identifier;
generating, by the management computer, a second authorization request message comprising a transaction amount and the replacement account identifier to the payment processing computer to authorize a transaction; and
receiving, by the management computer, a second authorization response message authorizing or declining the transaction, the second authorization response message including the replacement account identifier.
2. The method of
3. The method of
receiving, by the local workstation, the original account identifier from a keyboard device.
4. The method of
6. The method of
wherein the payment processing computer modifies the second authorization request message to exclude the replacement account identifier and to include the original account identifier, sends the second authorization request message with the original account identifier to the authorization computer and receives the second authorization response message from the authorization computer comprising the original account identifier, modifies the second authorization response message to include the replacement account identifier and transmits the second authorization response message with the replacement account identifier to the management computer.
9. The management computer of
wherein the payment processing computer modifies the second authorization request message to exclude the replacement account identifier and to include the original account identifier, sends the second authorization request message with the original account identifier to the authorization computer and receives the second authorization response message from the authorization computer comprising the original account identifier, modifies the second authorization response message to include the replacement account identifier and transmits the second authorization response message with the replacement account identifier to the management computer.
11. The system of
a data entry device in communication with the local workstation, wherein the data entry device comprises a second processor and a second computer readable medium, the second computer readable medium comprising code, executable by the second processor, for encrypting the original account identifier.
|
None.
Conventional systems and methods for generating replacement account numbers generally include sending an original account number from a requestor computer to a central host computer. The central host computer can then provide the replacement account number to the requester computer. The requestor computer can then use that replacement account number in a payment transaction instead of the original account number.
Systems and methods that use replacement account numbers instead of original account numbers are outside the scope of PCI (payment card industry) requirements, because the original account numbers are not at risk of being obtained by unauthorized persons. Since the methods and systems are outside the scope of PCI requirements, the methods and systems need not implement the stringent security protocols required by PCI.
While conventional systems and methods that use replacement account numbers are useful, a number of improvements can be made. For example, one problem with issuing replacement account numbers is that they can sometimes be issued even though the accounts associated with the account numbers used in the replacement account number requests may not be in good standing. This can impose a significant risk to various entities (e.g., issuers) who manage the accounts, or who might otherwise use the accounts to conduct payment transactions.
Embodiments of the invention address this and other problems, individually and collectively.
Embodiments of the present invention relate to systems and methods for providing better data and transaction security when processing payment transactions.
One embodiment of the invention is directed to a method. The method includes receiving, by a management computer, an authorization identifier. The authorization identifier is generated by an authorization computer after the authorization computer receives an authorization request message comprising an original account identifier (e.g., a PAN or primary account number) and a zero, nominal, or no dollar amount. The method also includes generating a replacement account identifier request message and sending the replacement account identifier request message to a payment processing computer. The method also includes receiving, by the management computer, in response to transmitting the replacement account identifier request message, a replacement account identifier response message comprising the replacement account identifier. The replacement account identifier can then be used to conduct payment transactions instead of the original account identifier.
Another embodiment of the invention is directed to a management computer comprising a processor and a computer readable medium coupled to the processor. The computer readable medium comprises code, executable by the processor to implement a method. The method comprises receiving an authorization identifier. The authorization identifier is generated by an authorization computer after the authorization computer receives an authorization request message comprising an original account identifier and a zero, nominal or no dollar amount. The method also includes generating a replacement account identifier request message, and transmitting the replacement account identifier request message to a payment processing computer. The method further comprises receiving, in response to transmitting the replacement account identifier request message, a replacement account identifier response message comprising the replacement account identifier. The replacement account identifier may thereafter be used to conduct payment transactions instead of the original account identifier.
Another embodiment of the invention is directed to a system comprising a local workstation and a management computer in communication with the local workstation. The management computer comprises a processor and a computer readable medium coupled to the processor. The computer readable medium comprises code, executable by the processor to implement a method. The method includes receiving an authorization identifier from the workstation. The authorization identifier is generated by an authorization computer after the authorization computer receives an authorization request message comprising an original account identifier and a zero, nominal or no dollar amount. The method also includes generating a replacement account identifier request message, transmitting the replacement account identifier request message to a payment processing computer, and receiving, in response to transmitting the replacement account identifier request message, a replacement account identifier response message comprising the replacement account identifier. The replacement account identifier may be used instead of the original account identifier to conduct transactions.
These and other embodiments of the invention are described in further detail below.
One embodiment of the invention is directed to a method that includes receiving, by a workstation and from a data entry device in a merchant system, an encrypted payment account identifier. Prior to receipt by the workstation, the encrypted payment account identifier was formed by encrypting an original account identifier at the data entry device.
The workstation may generate an authorization request message comprising an original account identifier and a zero, nominal or no dollar amount, and may transmit it to a payment processing computer. A “zero” dollar authorization request message is an authorization request message that has a zero in the amount data field. An authorization request message with a “no dollar” amount means that there is no dollar value in the amount data field in the authorization request message. A “nominal” dollar amount can relate to an amount that is not indicative of a normal transaction in the environment in which transactions are normally conducted by the merchant system. As such, the nominal dollar amount cannot be mistaken for a real transaction amount that might be processed by the merchant system. For example, if a cable TV provider sends always sends transaction amounts greater than $10, then any amount less than this may be a nominal dollar amount. Typically, a nominal dollar amount might be $1 or $0.01 (or any suitable value less than $2 or $1).
The authorization request message comprising the encrypted payment account identifier may then be transmitted to a payment processing computer. The payment processing computer then decrypts the encrypted payment account identifier to obtain the original unencrypted payment account identifier. After the payment processing computer obtains the unencrypted payment account identifier, it may generate an authorization request message comprising an original account identifier and the zero, nominal or no dollar amount.
In some embodiments, the payment processing computer may then transmit the authorization request message to an issuer computer via an acquirer computer and a payment processing network. The issuer computer may verify that the account exists and is otherwise in good standing. Once the account has been verified by the issuer computer, the issuer computer may transmit an authorization response message comprising an authorization identifier to the payment processing computer. The authorization identifier may then be provided to the workstation, and the workstation may provide it to an order management computer.
After the order management computer receives the authorization identifier, it may generate a replacement account identifier request message and transmit it to the payment processing computer. The payment processing computer may determine a replacement account identifier in response to receiving the authorization identifier. Once it is determined, the payment processing computer may then transmit it to the order management computer. The order management computer may then receive a replacement account identifier response message comprising a replacement account identifier for the original account identifier.
The replacement account identifier may be stored at the order management computer to conduct recurring or non-recurring payment transactions. For example, in some embodiments, the order management computer may periodically send requests including the replacement account identifiers and transaction amounts to the payment processing computer to obtain authorizations for the recurring transactions.
In a specific transaction, the payment processing computer may receive an authorization request message comprising the replacement account identifier and a transaction amount from the order management computer. It may then generate a modified authorization request message including the original account identifier and the transaction amount. It may then transmit it to the issuer computer via an acquirer computer and a payment processing network. The issuer may then respond to the authorization request message by transmitting an authorization response message back to the payment processing computer via the payment processing network and the acquirer computer.
At the end of the day or at some other suitable period of time, a clearing and settlement process between the payment processing network, the acquirer computer, and the issuer computer may take place.
As noted above, in embodiments of the invention, the original account identifier is not maintained by the order management computer. The original account identifier only passes through an original data entry device and local workstation one time, in an encrypted format. Only the replacement account identifier is used thereafter. Further, before the replacement account identifier is actually used for purchasing, the account associated with the original account identifier is verified. The verification of the status of the account can advantageously be obtained using a traditional credit and debit card payments infrastructure, before any replacement account identifiers are issued and used for payment transactions.
Before discussing specific embodiments of the invention, some terms may be discussed in further detail.
“Payment account information” may be any information that identifies or is associated with a payment account. Payment account information may be provided in order to make a payment from a payment account. Some examples of payment account information include one or more of a PAN (primary account number), a CVV (card verification value), a dCVV (dynamic card verification value), a user name, an expiration date, a gift card number or code, etc.
An “original account identifier” may include a transactable identifier associated with a payment account that directly represents the payment account. For example, an original account identifier may be a primary account number (PAN) issued by an issuer for a card account (e.g., credit card, debit card, etc.). For instance, in some embodiments, an original account identifier may include a sixteen digit numerical value such as “4147 0900 0000 1234.” The first six digits of the real account identifier (e.g., “414709”), may represent a real issuer identifier (e.g., a “BIN” or bank identification number) that may identify an issuer associated with the real account identifier.
A “replacement account identifier” may include an identifier for a payment account that is a substitute for an account identifier, such as an original account identifier or a primary account number (PAN). The replacement account identifier may have the same or different format as the primary account number. In some embodiments, the replacement account identifier may be a subscription ID, when the replacement account identifier is to be used for recurring payment transactions (as in the case of a subscription that utilizes a recurring payment authorization to maintain the subscription). In other embodiments, the replacement account identifier may include a series of alphanumeric characters that may be used as a substitute for an original account identifier. For example, a replacement account identifier “4900 0000 0000 0001” may be used in place of a PAN “4147 0900 0000 1234.” In some embodiments, a replacement account identifier may be “format preserving” and may have a numeric format that conforms to the account identifiers used in existing payment processing networks (e.g., ISO 8583 financial transaction message format). In some embodiments, a replacement account identifier may be used in place of a PAN to initiate, authorize, settle or resolve a payment transaction or represent the original credential in other systems where the original credential would typically be provided. In some embodiments, a replacement account identifier value may be generated such that the recovery of the original PAN or other account identifier from the replacement account identifier value may not be computationally derived. Further, in some embodiments, the replacement account identifier format may be configured to allow the entity receiving the replacement account identifier to identify it as a replacement account identifier and recognize the entity that issued the replacement account identifier.
An “authorization request message” may be an electronic message that is sent to request authorization for a transaction. The authorization request message can be sent to a payment processing network and/or an issuer of a payment card. An authorization request message according to some embodiments may comply with ISO 8583, which is a standard for systems that exchange electronic transaction information associated with a payment made by a user using a payment device or payment account. The authorization request message may include information that can be used to identify an account. An authorization request message may also comprise additional data elements such as one or more of a service code, an expiration date, etc. An authorization request message may also comprise transaction information, such as any information associated with a current transaction, such as the transaction amount, merchant identifier, merchant location, etc., as well as any other information that may be utilized in determining whether to identify and/or authorize a transaction. The authorization request message may also include other information such as information that identifies the access device (or other computer) that generated the authorization request message, information about the location of the access device, etc.
An “authorization response message” may be an electronic message reply to an authorization request message. The authorization response message can be generated by an issuing financial institution or a payment processing network. The authorization response message may include, by way of example only, one or more of the following status indicators: Approval—transaction was approved; Decline—transaction was not approved; or Call Center—response pending more information, merchant must call the toll-free authorization phone number. The authorization response message may also include an authorization code, which may be a code that a credit card issuing bank returns in response to an authorization request message in an electronic message (either directly or through the payment processing network) to the merchant computer that indicates approval of the transaction. The code may serve as proof of authorization. As noted above, in some embodiments, a payment processing network may generate or forward the authorization response message to the merchant.
A “key” may refer to a piece of information that is used in a cryptographic algorithm to transform input data into another representation. A cryptographic algorithm can be an encryption algorithm that transforms original data into an alternate representation, or a decryption algorithm that transforms encrypted information back to the original data. Examples of cryptographic algorithms may include triple data encryption standard (TDES), data encryption standard (DES), advanced encryption standard (AES), etc.
An “issuer” may typically refer to a business entity (e.g., a bank) that maintains an account for a user that is associated with a portable communication device such as an account enrolled in a mobile application installed on a portable communication device. An issuer may also issue account parameters associated with the account to a portable communication device. An issuer may be associated with a host system that performs some or all of the functions of the issuer on behalf of the issuer.
An “authorization computer” may include any suitable computer that can perform authorization processing. For example, an issuer computer is an example of an authorization computer. The issuer computer may authorize transactions by analyzing data in authorization request messages.
A “merchant” may typically be an entity that engages in transactions and can sell goods or services, or provide access to goods or services.
An “acquirer” may typically be a business entity (e.g., a commercial bank) that has a business relationship with a particular merchant or other entity. Some entities can perform both issuer and acquirer functions. Some embodiments may encompass such single entity issuer-acquirers.
A “server computer” may typically be a powerful computer or cluster of computers. For example, the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit. The server computer may be associated with an entity such as a payment processing network, a wallet provider, a merchant, an authentication cloud, an acquirer or an issuer.
The system in
In addition to being in communication with the local workstation 30 and the order management computer 40, the payment processing computer 50 may also be in communication with an issuer computer 80 via an acquirer computer 60 and a payment processing network 70. The payment processing computer 50 may be part of a secure transaction system, which may or may not include the issuer computer 80, the acquirer computer 60 and the payment processing network 70. Transmission and storage of original account identifiers may be secure in the payment processing computer 50, the issuer computer 80, the acquirer computer 60 and/or the payment processing network 70
The payment processing network 70 may include data processing subsystems, networks, and operations used to support and deliver authorization services, exception file services, transaction scoring services, and clearing and settlement services. An exemplary payment processing network may include VisaNet™. Payment processing networks such as VisaNet™ are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNet™, in particular, may include a VIP system (Visa Integrated Payments system) which processes authorization requests and a Base II system which performs clearing and settlement services.
Any suitable number or types of communication networks may be present between the computers and devices shown in
Computer readable media can include both volatile and nonvolatile media, both removable and non-removable media, and both local and remote media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVD) or other optical disc storage, magnetic cassettes, magnetic tape, magnetic disc storage or other magnetic storage devices, or any other medium.
The encryption module 10B-1 may comprise code, executable by the data processor 10A, to encrypt data such as primary account numbers. It may include code for performing any suitable and known encryption process including DES, triple DES, AES, etc.
The replacement account identifier creation request module 40B-1 may comprise code, executable by the data processor 40A to create a replacement account identifier request message. The replacement account identifier request message may request a replacement account identifier such as a subscription ID.
The replacement account identifier may be requested or provided to another computer using any suitable form of communication. In some embodiments, a replacement account identifier request may be in an electronic message format, such as an e-mail, a short messaging service (SMS) message, a multimedia messaging service (MMS) message, a hypertext transfer protocol (HTTP) request message, a transmission control protocol (TCP) packet, a web form submission. The replacement account identifier may be directed to any suitable location, such as an e-mail address, a telephone number, an internet protocol (IP) address, or a uniform resource locator (URL). In some embodiments, the replacement account identifier request may comprise a mix of different message types, such as both email and SMS messages.
The authorization processing module 40B-2 may comprise code, executable by the data processor 40A to perform authorization processing. Authorization processing may include the generation, transmission, and/or receipt of payment transaction authorization request and response messages.
The order tracking module 40B-3 may comprise code, executable by the data processor 40A, to track and manage orders associated with a particular account, subscription ID, or individual.
The authorization processing module 50B-1 may include code that is similar to the code in the previously described authorization processing modules 30B-1, 40B-1.
The replacement account identifier generation module 50B-1 may include code, executable by the data processor 50A, that can generate replacement account identifiers. Replacement account identifiers may be generated using an algorithm that converts real PANs into replacement account identifiers. In another example, a listing of replacement account identifiers may be generated in advance and they may be associated with actual PANs over time. In the latter case, the replacement account identifier may be generated in batch, rather than on a per account basis.
The replacement account identifier database 50B-3 may store data tables that map the replacement account identifiers to the PANs. The database 50B-3 may be a conventional, fault tolerant, relational, scalable, secure database such as Oracle™ or Sybase™.
The encryption/decryption module 50B-4 may comprise code, executable by the data processor 50A to encrypt or decrypt data. It may comprise code for performing any suitable encryption and/or decryption process using DES, triple DES, AES, or any other suitable encryption algorithm. In embodiments of the invention, the encryption/decryption module may comprise code for decrypting an encrypted PAN that is received from a merchant's data entry device.
In an embodiment of the invention, a consumer may contact a user operating the client computer 20 and the data entry device 10. For example, the user may be a call center employee acting on behalf of a merchant. The consumer can call the user to place an order for a good or service offered by the merchant. During the call, the consumer may provide the user with their credit card number and the expiration date associated with the credit card number (or any other suitable combination of payment credentials or account information). After the user receives this information, the user may then key in this information into the data entry device 10. In some embodiments, the data entry device 10 may be a keypad and the client computer 20 can be a desktop computer coupled to the keypad.
In step S100, after an original account identifier (e.g., a PAN) and the expiration date are keyed into the user interface 10D (e.g., keys) of the data entry device 100 (e.g., a keyboard) by the user, they are encrypted by the data entry device 100. The encryption module 10B-1 stored on the computer readable medium 10B may comprise encryption software that uses an encryption algorithm and one or more stored encryption keys 10B-2 to encrypt the original account identifier and the expiration date to form an encrypted payload.
In steps S110 and S120, the encrypted payload containing the encrypted original account identifier and the encrypted expiration date are sent to the local workstation 30 via the user's client computer 20.
In step S130, the local workstation 30 receives the encrypted payload. The local workstation 30 then uses the authorization processing module 30B-1 and the data processor 30A to generate a first authorization request message comprising the encrypted payload and a zero, nominal or no dollar transaction amount. The local workstation 30 then sends the zero, nominal or one dollar first authorization request message to the payment processing computer 60.
The zero, nominal or no dollar first authorization request message may include any suitable information. For example, it may include one or more of: (a) the encrypted payload received from the data entry device 10 (e.g., the encrypted card number and expiration date), (b) a merchant reference number, (c) a “bill to” name and address (these can be set to dummy values), (d) a device type or identifier for the device that captured the payment account information, (e) an indication of the encryption algorithm used to encrypt the payment account information, (f) an indication of any other encoding methods used, (g) an indication of the entry mode (keyed vs. swipe) used to obtain the account information, (h) an indication of the capabilities of the data entry device 10, and (i) a card present indicator (yes or no).
After the payment processing computer 60 receives the zero, nominal or no dollar authorization request message, the payment processing computer 60 decrypts the encrypted original account identifier and modifies the zero, nominal or no dollar authorization request message so that it excludes the encrypted original account identifier and includes the unencrypted original account identifier. The encryption module 50B-4 and one or more encryption keys 50B-5 may be used for this purpose. The modified zero, nominal or no dollar first authorization request message is then sent to the issuer computer 80 via the acquirer computer 60 and the payment processing network 70.
The issuer computer 80 may then verify that the account associated with the original account number is in good standing. This can occur using any suitable process. Examples of processes include AVS (account verification service) checks, fraud checks, etc. The issuer computer 80 may include a data processor, and a computer readable medium coupled to the data processor. The computer readable medium may store any suitable number of software modules, including, but not limited to, a fraud processing module, an authorization module and an account verification module.
After the issuer computer 80 determines that the original account number is in good standing, it may then generate a first authorization response message with an authorization identifier. The first authorization response message may comprise the unencrypted original account identifier. The first authorization response message may be sent by the issuer computer 80 to payment processing computer 50 via the payment processing network 70 and the acquirer computer 60. It may include the real account identifier. The payment processing computer 50 may then modify the first authorization response message so that it excludes the unencrypted original account identifier includes the encrypted original account identifier and the authorization identifier.
In step S140, the local workstation 30 then receives the first authorization response message including the authorization identifier from the payment processing computer 50.
In step S150, the user, using the client computer 20, the local workstation 30, and optionally the data entry device 10, inputs the authorization identifier into an electronic form provided by the order management computer 40. The appropriate form may be provided on a display in the client computer 20 by the order management computer 40. The authorization identifier may be input into the electronic form using any suitable process including manual data entry, automatic form filling, or the cutting and pasting of data using a device such as a computer mouse.
In step S160, using the replacement account identifier request module 50B-2, the order management computer 40 generates and sends a subscription create request message including the authorization identifier to the payment processing computer 50.
After receiving the subscription create request message, the payment processing computer 50, using the replacement account identifier generation module 50B-2, generates the replacement account identifier in the form of a subscription identifier and transmits it to the order management computer 40. The subscription identifier may be any suitable set of characters that may identify a subscription that is associated with the consumer. In some embodiments, the subscription identifier may be an example of a replacement account identifier that can be used in place of the original account identifier (whether in an encrypted or unencrypted form).
In step S164, the subscription identifier is received by the order management computer 40.
In step S168, after receiving the subscription identifier, the order management computer 40 generates and sends a second authorization request message, for the full order amount, to the payment processing computer 50 with the subscription identifier.
In step S170, the payment processing computer 50 sends the second authorization request message to the issuer computer 80 via the acquirer computer 60 and the payment processing network 70. Prior to sending the second authorization request message to the issuer computer 80, the payment processing computer 50 may modify the second authorization request message by replacing (or excluding) the subscription identifier with the original account identifier. Once the second authorization request message is received by the issuer computer 80, the issuer computer 80 may analyze the second authorization request message to determine if the transaction should be authorized or not. After analyzing the second authorization request message, the issuer computer may generate a second authorization response message indicating whether or not the transaction is approved or declined.
In step 180, the second authorization response message that was sent by the issuer computer 80 is received at the payment processing computer 50. The payment processing computer 50 processes the authorization with the data stores in the subscription profile and returns the result to the local workstation 30 and the client computer 20.
Before or after the second authorization request message is transmitted to the issuer computer 80 by the payment processing computer 50, the previously received original account identifier and expiration date may be stored along with the subscription ID (or other replacement account identifier) in the replacement account identifier database 50B-3. The replacement account identifier database 50B-3 may thus contain links between unencrypted payment account information and replacement account identifiers. The placement account identifier database 50B-3 can serve as a replacement account identifier vault for processing future payment transactions using the replacement account identifiers.
At the end of the day or at some other suitable period of time, a clearing and settlement process occurs between the acquirer computer 60, the payment processing network 70, and the issuer computer 80.
The various participants and elements described herein with reference to
Examples of such subsystems or components are shown in
Any of the software components or functions described in this application, may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a computer readable medium, such as a random access memory (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
Embodiments of the invention have a number of advantages. As noted above, in embodiments of the invention, the original account identifier (e.g., an unencrypted PAN) is encrypted at the point of entry to the merchant system and is not maintained or stored in the merchant system. Existing payment processing system channels can be used to verify the account before providing a replacement account identifier to the merchant system. Since the replacement account identifier is thereafter used for transaction processing, the merchant system can securely and efficiently process transactions while reducing the likelihood of future transaction declines by issuers. Systems according to embodiments of the invention can be considered outside the scope of PCI requirements.
The above description is illustrative and is not restrictive. Many variations of the invention will become apparent to those skilled in the art upon review of the disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the pending claims along with their full scope or equivalents.
One or more features from any embodiment may be combined with one or more features of any other embodiment without departing from the scope of the invention.
A recitation of “a”, “an” or “the” is intended to mean “one or more” unless specifically indicated to the contrary.
All patents, patent applications, publications, and descriptions mentioned above are herein incorporated by reference in their entirety for all purposes. None is admitted to be prior art.
Patent | Priority | Assignee | Title |
10496965, | Jan 20 2015 | Visa International Service Association | Secure payment processing using authorization request |
10726416, | Jun 25 2007 | Visa International Service Association | Secure mobile payment system |
10853797, | Sep 11 2012 | Visa International Service Association | Cloud-based virtual wallet NFC apparatuses, methods and systems |
11010734, | Jan 20 2015 | Visa International Service Association | Secure payment processing using authorization request |
11676138, | Aug 08 2013 | Visa International Service Association | Multi-network tokenization processing |
11715097, | Sep 11 2012 | Visa International Service Association | Cloud-based virtual wallet NFC apparatuses, methods and systems |
11900343, | Mar 03 2010 | Visa International Service Association | Portable account number for consumer payment account |
Patent | Priority | Assignee | Title |
5613012, | Nov 28 1994 | Open Invention Network, LLC | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
5781438, | Dec 19 1995 | Pitney Bowes Inc. | Token generation process in an open metering system |
5883810, | Sep 24 1997 | Microsoft Technology Licensing, LLC | Electronic online commerce card with transactionproxy number for online transactions |
5953710, | Oct 09 1996 | Children's credit or debit card system | |
5956699, | Oct 03 1996 | Jaesent Inc. | System for secured credit card transactions on the internet |
6000832, | Sep 24 1997 | Microsoft Technology Licensing, LLC | Electronic online commerce card with customer generated transaction proxy number for online transactions |
6014635, | Dec 08 1997 | SHC DIRECT, INC | System and method for providing a discount credit transaction network |
6044360, | Apr 16 1996 | RESTRICTED SPENDING SOLUTIONS, LLC | Third party credit card |
6163771, | Aug 28 1997 | PayPal, Inc | Method and device for generating a single-use financial account number |
6227447, | May 10 1999 | JPMORGAN CHASE BANK, N A | Cardless payment system |
6236981, | Nov 20 1996 | British Telecommunications public limited company | Transaction system |
6267292, | Jun 13 1997 | PayPal, Inc | Method and apparatus for funds and credit line transfers |
6327578, | Dec 29 1998 | PayPal, Inc | Four-party credit/debit payment protocol |
6341724, | May 10 1999 | JPMORGAN CHASE BANK, N A | Cardless payment system |
6385596, | Feb 06 1998 | Microsoft Technology Licensing, LLC | Secure online music distribution system |
6422462, | Mar 30 1998 | Apparatus and methods for improved credit cards and credit card transactions | |
6425523, | Aug 17 1998 | TUMBLEWEED HOLDINGS LLC | Method for preventing unauthorized use of credit cards in remote payments and an optional supplemental-code card for use therein |
6592044, | May 15 2000 | Privasys, Inc | Anonymous electronic card for generating personal coupons useful in commercial and security transactions |
6636833, | Mar 25 1998 | ORBIS PATENTS LTD | Credit card system and method |
6748367, | Sep 24 1999 | Method and system for effecting financial transactions over a public network without submission of sensitive information | |
6805287, | Sep 12 2002 | Liberty Peak Ventures, LLC | System and method for converting a stored value card to a credit card |
6879965, | Mar 01 2000 | SLINGSHOT TECHNOLOGIES LLC | Method, system and computer readable medium for web site account and e-commerce management from a central location |
6891953, | Jun 27 2000 | Microsoft Technology Licensing, LLC | Method and system for binding enhanced software features to a persona |
6901387, | Dec 07 2001 | Liberty Peak Ventures, LLC | Electronic purchasing method and apparatus for performing the same |
6931382, | Jan 24 2001 | Kioba Processing, LLC | Payment instrument authorization technique |
6938019, | Aug 29 2000 | AMPACASH CORPORATION | Method and apparatus for making secure electronic payments |
6941285, | Apr 14 2000 | Method and system for a virtual safe | |
6980670, | Feb 09 1998 | Open Invention Network, LLC | Biometric tokenless electronic rewards system and method |
6990470, | Apr 11 2000 | MasterCard International Incorporated | Method and system for conducting secure payments over a computer network |
6991157, | Sep 12 2002 | Liberty Peak Ventures, LLC | System and method for re-associating an account number to another transaction account |
7051929, | Oct 18 2004 | Secure credit card having daily changed security number | |
7069249, | Jul 26 1999 | iPrivacy, LLC | Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party |
7103576, | Sep 21 2001 | JPMORGAN CHASE BANK, N A | System for providing cardless payment |
7113930, | Feb 23 2001 | HEWLETT-PACKARD DEVELOPMENT COMPANY L P | Conducting transactions |
7136835, | Mar 25 1998 | ORBIS PATENTS LTD | Credit card system and method |
7177835, | Aug 28 1997 | PayPal, Inc | Method and device for generating a single-use financial account number |
7177848, | Apr 11 2000 | MasterCard International Incorporated | Method and system for conducting secure payments over a computer network without a pseudo or proxy account number |
7194437, | May 14 1999 | Amazon Technologies, Inc | Computer-based funds transfer system |
7209561, | Jul 19 2002 | Cybersource Corporation | System and method for generating encryption seed values |
7264154, | Jul 12 2004 | HARRIS INTELLECTUAL PROPERTY, LP | System and method for securing a credit account |
7287692, | Jul 28 2004 | Cisco Technology, Inc. | System and method for securing transactions in a contact center environment |
7292999, | Mar 15 2001 | Liberty Peak Ventures, LLC | Online card present transaction |
7350230, | Dec 18 2002 | CITIBANK, N A ; NCR Atleos Corporation | Wireless security module |
7353382, | Aug 08 2002 | InterDigital Patent Holdings, Inc | Security framework and protocol for universal pervasive transactions |
7379919, | Apr 11 2000 | MasterCard International Incorporated | Method and system for conducting secure payments over a computer network |
7415443, | Mar 15 2001 | Liberty Peak Ventures, LLC | Online card present transaction |
7444676, | Aug 29 2001 | Direct authentication and authorization system and method for trusted network of financial institutions | |
7469151, | Sep 01 2006 | MasterCard International Incorporated | Methods, systems and computer program products for over the air (OTA) provisioning of soft cards on devices with wireless communications capabilities |
7548889, | Jan 24 2005 | Microsoft Technology Licensing, LLC | Payment information security for multi-merchant purchasing environment for downloadable products |
7567934, | Mar 25 1998 | ORBIS PATENTS, LTD | Credit card system and method |
7567936, | Oct 14 2003 | BENHOV GMBH, LLC | Method and apparatus for handling pseudo identities |
7571139, | Feb 19 1999 | EXXONMOBIL RESEARCH & ENGINEERING CO | System and method for processing financial transactions |
7571142, | Jan 22 1999 | ORBIS PATENTS LTD | Credit card system and method |
7580898, | Mar 15 2004 | Fitbit, Inc | Financial transactions with dynamic personal account numbers |
7584153, | Mar 15 2004 | Fitbit, Inc | Financial transactions with dynamic card verification values |
7593896, | Mar 25 1998 | Orbis Patents Ltd. | Credit card system and method |
7606560, | Aug 08 2002 | PCMS HOLDINGS, INC | Authentication services using mobile device |
7627531, | Mar 07 2000 | Liberty Peak Ventures, LLC | System for facilitating a transaction |
7627895, | Mar 31 2004 | British Telecommunications public limited company | Trust tokens |
7650314, | May 25 2001 | Liberty Peak Ventures, LLC | System and method for securing a recurrent billing transaction |
7685037, | Mar 26 2001 | 3 M FUTURE LIMTIED | Transaction authorisation system |
7702578, | Jun 14 2001 | SLINGSHOT TECHNOLOGIES LLC | Method, system and computer readable medium for web site account and e-commerce management from a central location |
7707120, | Apr 17 2002 | Visa International Service Association | Mobile account authentication service |
7712655, | Jan 20 2004 | Banking computer account system with lock for secure payment via telephone | |
7734527, | Aug 29 2000 | AMPACASH CORPORATION | Method and apparatus for making secure electronic payments |
7753265, | Jul 12 2004 | HARRIS INTELLECTUAL PROPERTY, LP | System and method for securing a credit account |
7770789, | May 17 2007 | Shift4 Corporation | Secure payment card transactions |
7784685, | Apr 26 2007 | United Services Automobile Association (USAA); United Services Automobile Association | Secure card |
7793851, | May 09 2005 | DYNAMICS INC | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
7801826, | Aug 08 2002 | PCMS HOLDINGS, INC | Framework and system for purchasing of goods and services |
7805376, | Jun 14 2002 | Liberty Peak Ventures, LLC | Methods and apparatus for facilitating a transaction |
7805378, | Jul 10 2001 | Liberty Peak Ventures, LLC | System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions |
7818264, | Jun 19 2006 | Visa U.S.A. Inc.; VISA U S A INC | Track data encryption |
7828220, | May 09 2005 | DYNAMICS INC | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
7835960, | Mar 07 2000 | Liberty Peak Ventures, LLC | System for facilitating a transaction |
7841523, | May 17 2007 | Shift4 Corporation | Secure payment card transactions |
7841539, | Feb 15 2007 | Smart card with random temporary account number generation | |
7844550, | Aug 28 1997 | PayPal, Inc | Method and device for generating a single-use financial account number |
7848980, | Dec 26 2006 | Visa U.S.A. Inc. | Mobile payment system and method using alias |
7849020, | Apr 19 2005 | Microsoft Technology Licensing, LLC | Method and apparatus for network transactions |
7853529, | Aug 28 1997 | PayPal, Inc | Method and device for generating a single-use financial account number |
7853995, | Nov 18 2005 | Microsoft Technology Licensing, LLC | Short-lived certificate authority service |
7865414, | Mar 01 2000 | SLINGSHOT TECHNOLOGIES LLC | Method, system and computer readable medium for web site account and e-commerce management from a central location |
7873579, | Mar 15 2001 | Liberty Peak Ventures, LLC | Merchant facilitation of online card present transaction |
7873580, | Mar 15 2001 | Liberty Peak Ventures, LLC | Merchant system facilitating an online card present transaction |
7890393, | Feb 07 2002 | PayPal, Inc | Method and system for completing a transaction between a customer and a merchant |
7891563, | May 17 2007 | Shift4 Corporation | Secure payment card transactions |
7896238, | Apr 03 2007 | XYLON, LLC | Secured transaction using color coded account identifiers |
7908216, | Jul 22 1999 | Visa International Service Association | Internet payment, authentication and loading system using virtual smart card |
7922082, | Jan 04 2008 | M2 INTERNATIONAL LTD | Dynamic card validation value |
7931195, | May 09 2005 | DYNAMICS INC | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
7937324, | Sep 13 2007 | Visa U.S.A. Inc. | Account permanence |
7938318, | Apr 03 2007 | Kioba Processing, LLC | System and method for controlling secured transaction using directionally coded account identifiers |
7954705, | May 09 2005 | DYNAMICS INC | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
7959076, | Apr 26 2007 | United Services Automobile Association (USAA); United Services Automobile Association | Secure card |
7996288, | Nov 15 2000 | iPrivacy, LLC | Method and system for processing recurrent consumer transactions |
8025223, | Jun 10 2005 | Liberty Peak Ventures, LLC | System and method for mass transit merchant payment |
8046256, | Apr 14 2000 | Liberty Peak Ventures, LLC | System and method for using loyalty rewards as currency |
8060448, | May 30 2001 | Late binding tokens | |
8060449, | Jan 05 2009 | T-MOBILE INNOVATIONS LLC | Partially delegated over-the-air provisioning of a secure element |
8074877, | Dec 24 2007 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
8074879, | Jul 12 2004 | HARRIS INTELLECTUAL PROPERTY, LP | System and method for securing a credit account |
8082210, | Apr 29 2003 | The Western Union Company | Authentication for online money transfers |
8095113, | Oct 17 2007 | First Data Corporation | Onetime passwords for smart chip cards |
8104679, | Dec 17 2003 | Fitbit, Inc | Display payment card with fraud and location detection |
8109436, | Apr 26 2007 | United Services Automobile Association (USAA); United Services Automobile Association | Secure card |
8121942, | Jun 25 2007 | Visa U.S.A. Inc. | Systems and methods for secure and transparent cardless transactions |
8121956, | Jun 25 2007 | Visa U.S.A. Inc. | Cardless challenge systems and methods |
8126449, | Nov 13 2008 | Liberty Peak Ventures, LLC | Servicing attributes on a mobile device |
8171525, | Sep 15 2011 | GOOGLE LLC | Enabling users to select between secure service providers using a central trusted service manager |
8175973, | Jul 22 1999 | Visa International Service Association | Internet payment, authentication and loading system using virtual smart card |
8190523, | Sep 13 2007 | Visa U.S.A. Inc. | Account permanence |
8196813, | Dec 03 2008 | PayPal, Inc | System and method to allow access to a value holding account |
8205791, | Oct 11 2005 | National Payment Card Association | Payment system and methods |
8219489, | Jul 29 2008 | Visa U.S.A. Inc. | Transaction processing using a global unique identifier |
8224702, | Dec 28 2007 | PayPal, Inc | Systems and methods for facilitating financial transactions over a network |
8225385, | Mar 23 2006 | Microsoft Technology Licensing, LLC | Multiple security token transactions |
8229852, | Jun 25 2007 | Visa International Service Association | Secure mobile payment system |
8265993, | Apr 14 2000 | Liberty Peak Ventures, LLC | System and method for using loyalty rewards as currency |
8280777, | Dec 28 2007 | PayPal, Inc | Systems and methods for facilitating financial transactions over a network |
8281991, | Aug 07 2008 | VISA U S A INC | Transaction secured in an untrusted environment |
8328095, | May 17 2007 | Shift4 Corporation | Secure payment card transactions |
8336088, | Apr 19 2010 | Visa International Service Association | Alias management and value transfer claim processing |
8346666, | Jan 19 2010 | Visa International Service Association | Token based transaction authentication |
8376225, | Apr 26 2007 | United Services Automobile Association (USAA) | Secure card |
8380177, | Apr 09 2010 | PayPal, Inc | Mobile phone payment processing methods and systems |
8387873, | Jun 10 2005 | Liberty Peak Ventures, LLC | System and method for mass transit merchant payment |
8401539, | Nov 13 2008 | Liberty Peak Ventures, LLC | Servicing attributes on a mobile device |
8401898, | Apr 14 2000 | Liberty Peak Ventures, LLC | System and method for using loyalty rewards as currency |
8402555, | Mar 21 2010 | UNITED STATES DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE | Personalized digital media access system (PDMAS) |
8403211, | Sep 04 2008 | PATHWARD, NATIONAL ASSOCIATION | System, program product and methods for retail activation and reload associated with partial authorization transactions |
8412623, | Jul 15 2002 | CITICORP CREDIT SERVICES, INC USA | Method and system for a multi-purpose transactional platform |
8412837, | Jul 08 2004 | ROSKIND, JAMES A , DR | Data privacy |
8417642, | Sep 14 2004 | CORK GROUP TRADING LTD | Online commercial transaction system and method of operation thereof |
8433116, | Nov 03 2009 | STRATA SKIN SCIENCES, INC | Showing skin lesion information |
8447699, | Oct 13 2009 | Qualcomm Incorporated | Global secure service provider directory |
8453223, | Sep 23 2011 | Method, device and system for secure transactions | |
8453925, | Mar 02 2006 | VISA INTERNATIONAL SERVICE CORPORATION | Method and system for performing two factor authentication in mail order and telephone order transactions |
8458487, | Mar 03 2010 | OPEN TEXT HOLDINGS, INC | System and methods for format preserving tokenization of sensitive information |
8484134, | Mar 15 2001 | Liberty Peak Ventures, LLC | Online card present transaction |
8485437, | Dec 24 2007 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
8494959, | Aug 17 2007 | EMC IP HOLDING COMPANY LLC | Payment card with dynamic account number |
8498908, | Dec 28 2007 | PayPal, Inc | Systems and methods for facilitating financial transactions over a network |
8504475, | Aug 10 2009 | Visa International Service Association | Systems and methods for enrolling users in a payment service |
8504478, | Dec 21 2007 | Liberty Peak Ventures, LLC | Systems, methods and computer program products for performing mass transit merchant transactions |
8510816, | Feb 25 2010 | SecureAuth Corporation | Security device provisioning |
8533860, | Jan 11 2013 | UNITED STATES DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE | Personalized digital media access system—PDMAS part II |
8538845, | Jun 03 2011 | FINTIV, INC | Monetary transaction system |
8555079, | Dec 06 2011 | WWPass Corporation | Token management |
8566168, | Jan 05 2012 | T-MOBILE INNOVATIONS LLC | Electronic payment using a proxy account number stored in a secure element |
8567670, | Mar 27 2009 | Aura Sub, LLC | Dynamic card verification values and credit transactions |
8571939, | Jul 07 2010 | Toshiba Global Commerce Solutions Holdings Corporation | Two phase payment link and authorization for mobile devices |
8577336, | Nov 18 2010 | COM INVESTMENTS, LLC | System and method for transaction authentication using a mobile communication device |
8577803, | Jun 03 2011 | Visa International Service Association | Virtual wallet card selection apparatuses, methods and systems |
8577813, | Feb 21 2006 | Universal Secure Registry, LLC | Universal secure registry |
8578176, | Mar 26 2008 | PROTEGRITY US HOLDING, LLC | Method and apparatus for tokenization of sensitive sets of characters |
8583494, | Nov 30 2007 | BLAZE MOBILE, INC | Processing payments at a management server with user selected payment method |
8584251, | Apr 07 2009 | PRINCETON PAYMENT SOLUTIONS, LLC DELAWARE , WHOLLY-OWNED SUBSIDIARY OF FINANCIAL TRANSACTION SERVICES, LLC | Token-based payment processing system |
8589237, | Nov 30 2007 | BLAZE MOBILE, INC | Online purchase from a mobile device using a default payment method |
8589271, | Feb 04 2002 | ST ISIDORE RESEARCH, LLC | System and method for verification, authentication, and notification of transactions |
8589291, | Jun 25 2007 | Visa U.S.A. Inc. | System and method utilizing device information |
8595098, | Mar 18 2009 | NETWORK MERCHANTS, LLC | Transmission of sensitive customer information during electronic-based transactions |
8595812, | Dec 18 2009 | SABRE GLBL INC | Tokenized data security |
8595850, | Jan 30 2012 | MICRO FOCUS LLC | System for protecting sensitive data with distributed tokenization |
8606638, | Mar 02 2009 | First Data Corporation | Systems, methods and apparatus for facilitating transactions using a mobile device |
8606700, | Jun 25 2007 | VISA U.S.A., Inc. | Systems and methods for secure and transparent cardless transactions |
8606720, | Nov 13 2011 | GOOGLE LLC | Secure storage of payment information on client devices |
8615468, | Jan 27 2010 | CA, INC | System and method for generating a dynamic card value |
8620754, | Nov 30 2007 | BLAZE MOBILE, INC | Remote transaction processing using authentication information |
8635157, | Jul 19 2010 | PAYME, INC | Mobile system and method for payments and non-financial transactions |
8646059, | Dec 17 2010 | GOOGLE LLC | Wallet application for interacting with a secure element application without a trusted server for authentication |
8651374, | Jun 02 2008 | TRANSFORM SR BRANDS LLC | System and method for payment card industry enterprise account number elimination |
8656180, | Dec 06 2011 | WWPass Corporation | Token activation |
8751391, | Mar 29 2002 | JPMORGAN CHASE BANK, N A | System and process for performing purchase transactions using tokens |
8762263, | Sep 06 2005 | Visa U.S.A. Inc. | System and method for secured account numbers in proximity devices |
8793186, | Sep 13 2007 | Visa U.S.A. Inc. | Account permanence |
8838982, | Sep 21 2011 | Visa International Service Association | Systems and methods to secure user identification |
8856539, | Mar 16 2001 | Universal Secure Registry, LLC | Universal secure registry |
8887308, | Mar 21 2010 | UNITED STATES DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE | Digital cloud access (PDMAS part III) |
9065643, | Jun 26 2007 | VISA U S A INC | System and method for account identifier obfuscation |
9070129, | Sep 04 2007 | Visa U.S.A. Inc.; VISA U S A INC | Method and system for securing data fields |
9100826, | Feb 21 2006 | Universal Secure Registry, LLC | Method and apparatus for secure access payment and identification |
9160741, | Apr 17 2007 | Visa U.S.A. Inc. | Remote authentication system |
9229964, | Oct 27 2011 | Visa International Service Association | Database cloning and migration for quality assurance |
9245267, | Mar 03 2010 | Visa International Service Association | Portable account number for consumer payment account |
9249241, | Mar 27 2013 | UT-Battelle, LLC | Surface-functionalized mesoporous carbon materials |
9256871, | Jul 26 2012 | Visa U.S.A. Inc. | Configurable payment tokens |
9280765, | Apr 11 2011 | Visa International Service Association | Multiple tokenization for authentication |
9530137, | Feb 21 2006 | Universal Secure Registry, LLC | Method and apparatus for secure access payment and identification |
20010029485, | |||
20010034720, | |||
20010054003, | |||
20020007320, | |||
20020016749, | |||
20020029193, | |||
20020035548, | |||
20020073045, | |||
20020116341, | |||
20020133467, | |||
20020147913, | |||
20030028481, | |||
20030130955, | |||
20030191709, | |||
20030191945, | |||
20040010462, | |||
20040050928, | |||
20040059682, | |||
20040093281, | |||
20040139008, | |||
20040143532, | |||
20040158532, | |||
20040210449, | |||
20040210498, | |||
20040232225, | |||
20040260646, | |||
20050037735, | |||
20050080730, | |||
20050108178, | |||
20050199709, | |||
20050246293, | |||
20050269401, | |||
20050269402, | |||
20060235795, | |||
20060237528, | |||
20060278704, | |||
20070107044, | |||
20070129955, | |||
20070136193, | |||
20070136211, | |||
20070170247, | |||
20070179885, | |||
20070208671, | |||
20070245414, | |||
20070288377, | |||
20070291995, | |||
20080015988, | |||
20080029607, | |||
20080035738, | |||
20080052226, | |||
20080054068, | |||
20080054079, | |||
20080054081, | |||
20080065554, | |||
20080065555, | |||
20080201264, | |||
20080201265, | |||
20080228646, | |||
20080243702, | |||
20080245855, | |||
20080245861, | |||
20080283591, | |||
20080302869, | |||
20080302876, | |||
20080313264, | |||
20090006262, | |||
20090010488, | |||
20090037333, | |||
20090037388, | |||
20090043702, | |||
20090048971, | |||
20090106112, | |||
20090106160, | |||
20090134217, | |||
20090157555, | |||
20090159673, | |||
20090159700, | |||
20090159707, | |||
20090173782, | |||
20090200371, | |||
20090248583, | |||
20090276347, | |||
20090281948, | |||
20090294527, | |||
20090307139, | |||
20090308921, | |||
20090327131, | |||
20100008535, | |||
20100088237, | |||
20100094755, | |||
20100106644, | |||
20100120408, | |||
20100133334, | |||
20100138347, | |||
20100145860, | |||
20100161433, | |||
20100185545, | |||
20100211505, | |||
20100223186, | |||
20100228668, | |||
20100235284, | |||
20100258620, | |||
20100291904, | |||
20100299267, | |||
20100306076, | |||
20100325041, | |||
20110010292, | |||
20110016047, | |||
20110016320, | |||
20110040640, | |||
20110047076, | |||
20110083018, | |||
20110087596, | |||
20110093397, | |||
20110125597, | |||
20110153437, | |||
20110153498, | |||
20110154466, | |||
20110161233, | |||
20110178926, | |||
20110191244, | |||
20110238511, | |||
20110238573, | |||
20110246317, | |||
20110258111, | |||
20110272471, | |||
20110272478, | |||
20110276380, | |||
20110276381, | |||
20110276424, | |||
20110276425, | |||
20110295745, | |||
20110302081, | |||
20120023567, | |||
20120028609, | |||
20120030047, | |||
20120035998, | |||
20120041881, | |||
20120047237, | |||
20120066078, | |||
20120072350, | |||
20120078735, | |||
20120078798, | |||
20120078799, | |||
20120095852, | |||
20120095865, | |||
20120116902, | |||
20120123882, | |||
20120123940, | |||
20120129514, | |||
20120136796, | |||
20120143767, | |||
20120143772, | |||
20120158580, | |||
20120158593, | |||
20120173431, | |||
20120185386, | |||
20120197807, | |||
20120203664, | |||
20120203666, | |||
20120215688, | |||
20120215696, | |||
20120221421, | |||
20120226582, | |||
20120231844, | |||
20120233004, | |||
20120246070, | |||
20120246071, | |||
20120246079, | |||
20120265631, | |||
20120271770, | |||
20120297446, | |||
20120300932, | |||
20120303503, | |||
20120303961, | |||
20120304273, | |||
20120310725, | |||
20120310831, | |||
20120316992, | |||
20120317035, | |||
20120317036, | |||
20130017784, | |||
20130018757, | |||
20130019098, | |||
20130031006, | |||
20130054337, | |||
20130054466, | |||
20130054474, | |||
20130081122, | |||
20130091028, | |||
20130110658, | |||
20130111599, | |||
20130117185, | |||
20130124290, | |||
20130124291, | |||
20130124364, | |||
20130138525, | |||
20130144888, | |||
20130145148, | |||
20130145172, | |||
20130159178, | |||
20130159184, | |||
20130166402, | |||
20130166456, | |||
20130173736, | |||
20130185202, | |||
20130191286, | |||
20130191289, | |||
20130198071, | |||
20130198080, | |||
20130200146, | |||
20130204787, | |||
20130204793, | |||
20130212007, | |||
20130212017, | |||
20130212019, | |||
20130212024, | |||
20130212026, | |||
20130212666, | |||
20130218698, | |||
20130218769, | |||
20130226799, | |||
20130226813, | |||
20130246199, | |||
20130246202, | |||
20130246203, | |||
20130246258, | |||
20130246259, | |||
20130246261, | |||
20130246267, | |||
20130254028, | |||
20130254052, | |||
20130254102, | |||
20130254117, | |||
20130262296, | |||
20130262302, | |||
20130262315, | |||
20130262316, | |||
20130262317, | |||
20130275300, | |||
20130275307, | |||
20130275308, | |||
20130282502, | |||
20130282575, | |||
20130282588, | |||
20130297501, | |||
20130297504, | |||
20130297508, | |||
20130304649, | |||
20130308778, | |||
20130311382, | |||
20130317982, | |||
20130332344, | |||
20130339253, | |||
20130346314, | |||
20140007213, | |||
20140013106, | |||
20140013114, | |||
20140013452, | |||
20140019352, | |||
20140025581, | |||
20140025585, | |||
20140025958, | |||
20140032417, | |||
20140032418, | |||
20140040137, | |||
20140040139, | |||
20140040144, | |||
20140040145, | |||
20140040148, | |||
20140040628, | |||
20140041018, | |||
20140046853, | |||
20140047551, | |||
20140052532, | |||
20140052620, | |||
20140052637, | |||
20140068706, | |||
20140074637, | |||
20140108172, | |||
20140114857, | |||
20140143137, | |||
20140164243, | |||
20140188586, | |||
20140294701, | |||
20140297534, | |||
20140310183, | |||
20140330721, | |||
20140330722, | |||
20140331265, | |||
20140337236, | |||
20140344153, | |||
20140372308, | |||
20150019443, | |||
20150032625, | |||
20150032626, | |||
20150032627, | |||
20150046338, | |||
20150046339, | |||
20150052064, | |||
20150088756, | |||
20150106239, | |||
20150112870, | |||
20150112871, | |||
20150120472, | |||
20150127529, | |||
20150127547, | |||
20150140960, | |||
20150142673, | |||
20150161597, | |||
20150178724, | |||
20150180836, | |||
20150186864, | |||
20150193222, | |||
20150195133, | |||
20150199679, | |||
20150199689, | |||
20150220917, | |||
20150269566, | |||
20150312038, | |||
20150319158, | |||
20150332262, | |||
20150356560, | |||
20160028550, | |||
20160042263, | |||
20160065370, | |||
20160092696, | |||
20160092872, | |||
20160103675, | |||
20160119296, | |||
20160224976, | |||
20170046696, | |||
20170103387, | |||
20170220818, | |||
20170228723, | |||
EP2156397, | |||
RE40444, | Dec 29 1998 | PayPal, Inc | Four-party credit/debit payment protocol |
RE43157, | Sep 12 2002 | Liberty Peak Ventures, LLC | System and method for reassociating an account number to another transaction account |
WO2001035304, | |||
WO2004042536, | |||
WO2006113834, | |||
WO2009032523, | |||
WO2010078522, | |||
WO2012068078, | |||
WO2012098556, | |||
WO2012142370, | |||
WO2012167941, | |||
WO2013048538, | |||
WO2013056104, | |||
WO2013119914, | |||
WO2013179271, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jan 20 2015 | Visa International Service Association | (assignment on the face of the patent) | / | |||
Feb 23 2015 | MCGUIRE, KEITH | Visa International Service Association | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 035097 | /0582 |
Date | Maintenance Fee Events |
Mar 23 2022 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Oct 09 2021 | 4 years fee payment window open |
Apr 09 2022 | 6 months grace period start (w surcharge) |
Oct 09 2022 | patent expiry (for year 4) |
Oct 09 2024 | 2 years to revive unintentionally abandoned end. (for year 4) |
Oct 09 2025 | 8 years fee payment window open |
Apr 09 2026 | 6 months grace period start (w surcharge) |
Oct 09 2026 | patent expiry (for year 8) |
Oct 09 2028 | 2 years to revive unintentionally abandoned end. (for year 8) |
Oct 09 2029 | 12 years fee payment window open |
Apr 09 2030 | 6 months grace period start (w surcharge) |
Oct 09 2030 | patent expiry (for year 12) |
Oct 09 2032 | 2 years to revive unintentionally abandoned end. (for year 12) |